• Electronics Optics & Control
  • Vol. 21, Issue 9, 1 (2014)
[in Chinese]1、2, [in Chinese]2, and [in Chinese]2
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2014.09.001 Cite this Article
    [in Chinese], [in Chinese], [in Chinese]. The Tactical Maneuver in Cyber Space[J]. Electronics Optics & Control, 2014, 21(9): 1 Copy Citation Text show less
    References

    [1] Air Force Cyber Command.Air force Cyber command strategies version[M].Barksdale:AAAFBLA2008.

    [2] FORSYTH M HGENERAL M.“Cyberspace operations”air force doctrine document 312[R].Air Force Washington D.C.2010.

    [3] Chairman of the Joint Chiefs of Staff.National military strategy for cyberspace operations[R].Washington D.C.December2006.

    [4] TYUGU E.Command and control of Cyber weapons[C]//The 4th International Conference on Cyber Conflict2012:1-11.

    [5] Joint Chiefs of Staff.Joint publication 30:Joint operationsJP 30[R].United States Department of Defense Washington D.C.2011:III27.

    [6] PARKS R CDUGGAN D P.Principles of Cyber warfare[C]//Proceedings of the IEEE Workshop on Information Assurance and Security United States Military AcademyWest PointNY56 June2001:122-125.

    [7] FULGHUM D AWALL R.U.S.electronic surveillance monitored israeli attack on Syria[EB/OL].200711-14[20140101].http://www.aviationweek.com/aw/generic/story_generic.jsp channel=defense&id=news/ISRA112107.xml&headline=U.S.%20Electronic % 20 Surveillance % 20 Monitored % 20 Israeli % 20 Attack % 20 On % 20 Syria.

    [8] LIU XZHAO M.Offense and defense technology in Cyberwar—analysis on project Suter[J].Command Information System and Technology 20112(4):1-9.

    [9] YANG MSHEN Y.The overview of US AEA system[J].Electronic Information Warfare Technology2010 5(4):12-16.

    [10] HEW PLEWIS E.Situation awareness for supervisory control:Two fratricide cases revisited[C]// International Command and Control Research and Technology SymposiumSanta MonicaCalifornia2010:1-20.

    [11] U.S.Department of Defense.Department of defense strategy for operating in Cyberspace [R].Washington D.C.Jul.2011.

    [12] JAJODIA SGHOSH A KSUBRAHMANIAN V S.Moving target defense Ⅱ: Application of game theory and adversarial modeling advances in information security[M].New York:Springer Science Business Media 2013.

    [13] LORD W T.Cyberspace operations:Air force space command takes the lead[J].High Frontier20095 (3):3-5.

    [14] BERAUD PCRUZ AHASELL Set al.Using Cyber maneuver to improve network resiliency[C]//Military Comm unications Comference2011:1121-1126.

    [15] BERAUD PCRUZ AHASSELL Set al.Cyber defense network maneuver commander[C]//IEEE International Carnahan Conference on Security Technology (ICCST)2010:112-120.

    [16] U.S.Department of Defense.JP 102 DOD dictionary of military and associated terms[R].Washington D.C. Oct.172008.

    [17] HUANG N FKAO C NHUN H Wet al.Apply data mining to defenseindepth network security system[C]//The 19th International Conference on Advanced Information Networking and ApplicationsAINA 20052005:159-162.

    [18] GROAT STRONT JMARCHANY R.Advancing the defense in depth model[C]//The 7th International Conference on System of Systems Engineering (SoSE)2012:285-290.

    [19] SLIPPER DMCEWAN A A IFILL W.Modelling and analyzing defenseindepth in arming systems[C]//International Conference on System Science and Engineering (ICSSE) 2013:303-308.

    [20] EOM J HKIM N UKIM S Het al.Cyber military strategy for Cyberspace superiority in Cyber warfare[C]//International Conference on Cyber SecurityCyber Warfare and Digital Forensic (CyberSec)Kuala Lumpur2012:295-299.

    [21] Joint Chiefs of Staff.Joint publication:30 joint operationsJP 30[R].United States Department of Defense Washington D.C.20013-28.

    [22] WELLS II L.Maneuver in the global commons——the Cyber dimension[EB/OL].20101001[20140101].http://www.afcea.org/signal/articles/templates/Signal_Article_Template.asp articleid=2472 & zoneid=306.

    [23] HUANG R QLI W MZHANG R Jet al.Research on the defense in depth system in air defense information network[J].Computer Science201138(10A):53-55-58.

    [24] SPITZNER L.Problem and challenges with honey pots [EB/OL].200401-14[20140101].http://www.security focus.Com/infocus/17572004.

    [25] YAO LWANG X M.A study on the network active defense technology based on deception[J].Journal of National University of Defense Technology200830(3):65-69.

    [26] WU Y H.Study on the intrusion detection and counter attack technology based on the mobile agent[D].Nanjing:Nanjing University of Posts and Telecommunications,2005.

    CLP Journals

    [1] WANG Xian-chao, XIE Yi. Development of Aviation Waveguide Holographic Sighting Display Technology[J]. Electronics Optics & Control, 2015, 22(12): 67